Secret Information of Wireless Multi-Dimensional Gaussian Channels

Wireless channel reciprocity can be exploited by two users willing to achieve confidential communications over a public channel as a common source of randomness for the generation of a secret key. This paper presents an analytical framework for investigating the amount of secret information that characterizes wireless multi-dimensional Gaussian channels used as source of randomness. The intrinsic secrecy content of wide-sense stationary wireless channels in frequency, time and spatial domains is derived through asymptotic analysis. Some significant case studies are presented, where single and multiple antenna eavesdroppers are considered. In the numerical results, the role of signal-to-noise ratio, spatial correlation, frequency and time selectivity, sampling frequency and imperfect channel reciprocity is investigated.

[1]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2013, IEEE Trans. Mob. Comput..

[2]  Rudolf Ahlswede,et al.  Common randomness in information theory and cryptography - I: Secret sharing , 1993, IEEE Trans. Inf. Theory.

[3]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[4]  Amiel Feinstein,et al.  Information and information stability of random variables and processes , 1964 .

[5]  Joseph M. Kahn,et al.  Fading correlation and its effect on the capacity of multielement antenna systems , 2000, IEEE Trans. Commun..

[6]  Athina P. Petropulu,et al.  On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels , 2011, IEEE Transactions on Wireless Communications.

[7]  J. D. Parsons,et al.  The Mobile Radio Propagation Channel , 1991 .

[8]  H. Vincent Poor,et al.  A Unified Framework for Key Agreement Over Wireless Fading Channels , 2009, IEEE Transactions on Information Forensics and Security.

[9]  Suhas N. Diggavi,et al.  Secret-Key Generation Using Correlated Sources and Channels , 2009, IEEE Transactions on Information Theory.

[10]  Stark C. Draper,et al.  Secret key generation through OFDM multipath channel , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[11]  Mudhakar Srivatsa,et al.  Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary , 2012, IEEE/ACM Transactions on Networking.

[12]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[13]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[14]  H. T. Mouftah,et al.  The internet of things [Guest Editorial] , 2011, IEEE Commun. Mag..

[15]  Andrei N. Kolmogorov,et al.  On the Shannon theory of information transmission in the case of continuous signals , 1956, IRE Trans. Inf. Theory.

[16]  Rao Yarlagadda,et al.  Unconventional cryptographic keying variable management , 1995, IEEE Trans. Commun..

[17]  Michael A. Jensen,et al.  Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients , 2011, IEEE Transactions on Mobile Computing.

[18]  Boualem Boashash,et al.  Time-Frequency Signal Analysis and Processing , 2002 .

[19]  Jon W. Wallace Secure Physical Layer Key Generation Schemes: Performance and Information Theoretic Limits , 2009, 2009 IEEE International Conference on Communications.

[20]  W. C. Jakes,et al.  Microwave Mobile Communications , 1974 .

[21]  Aggelos Kiayias,et al.  On passive inference attacks against physical-layer key extraction? , 2011, EUROSEC '11.

[22]  Stark C. Draper,et al.  Minimum energy per bit for secret key acquisition over multipath wireless channels , 2009, 2009 IEEE International Symposium on Information Theory.

[23]  Jean Pierre Delmas,et al.  Asymptotic eigenvalue distribution of block Toeplitz matrices and application to blind SIMO channel identification , 2001, IEEE Trans. Inf. Theory.

[24]  Davide Dardari,et al.  Secret key generation in correlated multi-dimensional Gaussian channels , 2014, 2014 IEEE International Conference on Communications (ICC).

[25]  Moe Z. Win,et al.  Wireless Network Intrinsic Secrecy , 2015, IEEE/ACM Transactions on Networking.

[26]  Stark C. Draper,et al.  Impact of channel sparsity and correlated eavesdropping on secret key generation from multipath channel randomness , 2010, 2010 IEEE International Symposium on Information Theory.

[27]  Jon W. Wallace,et al.  Automatic Secret Keys From Reciprocal MIMO Wireless Channels: Measurement and Analysis , 2010, IEEE Transactions on Information Forensics and Security.

[28]  David Tse,et al.  Channel Identification: Secret Sharing using Reciprocity in Ultrawideband Channels , 2007 .

[29]  U. Maurer,et al.  Secret key agreement by public discussion from common information , 1993, IEEE Trans. Inf. Theory.

[30]  Davide Dardari,et al.  A secret key exchange scheme for near field communication , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[31]  Donald C. Cox,et al.  Correlation analysis based on MIMO channel measurements in an indoor environment , 2003, IEEE J. Sel. Areas Commun..

[32]  Shlomo Shamai,et al.  Information Theoretic Security , 2009, Found. Trends Commun. Inf. Theory.

[33]  Davide Dardari,et al.  The effect of channel spatial correlation on physical layer security in multi-antenna scenarios , 2013, 2013 Asilomar Conference on Signals, Systems and Computers.

[34]  Hai Su,et al.  Secret key generation exploiting channel characteristics in wireless communications , 2011, IEEE Wireless Communications.

[35]  Peng Ning,et al.  Is link signature dependable for wireless security? , 2013, 2013 Proceedings IEEE INFOCOM.